(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

Disclosed is a method for graphically viewing the relationship between user accounts and the resources to which the user has access. User accounts are the objects which describe various aspects of a computer user in a network, such as name and password; resources are the files, applications, printers and other objects to which the user is assigned access across the system.

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
52% of the total text.

Resources View for User Accounts

Disclosed is
a method for graphically viewing the
relationship between user accounts and the resources to which the
user has access. User accounts are the
objects which describe
various aspects of a computer user in a network, such as name and
password; resources are the files, applications, printers and other
objects to which the user is assigned access across the system.

In past
implementations, users were shown a list of all
available resources, and when they tried to access an object to which
they did not have permission, they were notified by the system that
access was denied. Users were also
required to know the location of
the objects they wished to access. This
method provides the
information to the user in a single view, showing only those
resources the user is allowed to access and eliminating wasted
attempts to access objects to which the user is denied permission.
This is especially beneficial in environments which are rapidly
expanding into larger and larger networks.
The number of steps
required for the user to find out the information is reduced
significantly by providing this view.

In today's
windowing environments it is possible to have
multiple views of an object. These views
may show the object in
different formats, such as icon or text.
This method suggests
extending the definition of objects to include views with
group-related information; specifically, the resources view is a list
of all the resources to which the selected user has access, shown in
a primary window adjacent to the user object.
The user may
manipulate the resources in a familiar way by accessing options
through pull-down menus and dialog boxes.
The user may also directly
manipulate the...